Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 11:09
Behavioral task
behavioral1
Sample
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe
-
Size
37KB
-
MD5
bb9d4ebcc754a7e6cb7536b735d85fdf
-
SHA1
62a93b979c2634af2b39520df73249747bbed84c
-
SHA256
850072b510695bd8649daad557e371b869054361e888d1aa4ffa51cf8e8c7c87
-
SHA512
e727a8e987da902339c6ceef93e163fedaa8a0a03c5e0784ac919653f0428f8723ebab7d232cef80bd1337956254c4333fba500ee85fdfdc2a80884822e48363
-
SSDEEP
384:gUG23hUidkGXR21cGMy8Pqq53tGFlymZErAF+rMRTyN/0L+EcoinblneHQM3epzs:JG23ZLGv8Pqq58im+rM+rMRa8NuFgt
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1076 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe -
Drops startup file 2 IoCs
Processes:
server5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\18df5afc301de09badbb5fa494c2daf3.exe server5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\18df5afc301de09badbb5fa494c2daf3.exe server5.exe -
Executes dropped EXE 1 IoCs
Processes:
server5.exepid process 3428 server5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
server5.exedescription pid process Token: SeDebugPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe Token: 33 3428 server5.exe Token: SeIncBasePriorityPrivilege 3428 server5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exeserver5.exedescription pid process target process PID 1904 wrote to memory of 3428 1904 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe server5.exe PID 1904 wrote to memory of 3428 1904 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe server5.exe PID 1904 wrote to memory of 3428 1904 bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe server5.exe PID 3428 wrote to memory of 1076 3428 server5.exe netsh.exe PID 3428 wrote to memory of 1076 3428 server5.exe netsh.exe PID 3428 wrote to memory of 1076 3428 server5.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb9d4ebcc754a7e6cb7536b735d85fdf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\server5.exe"C:\Users\Admin\AppData\Local\Temp\server5.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server5.exe" "server5.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\server5.exeFilesize
37KB
MD5bb9d4ebcc754a7e6cb7536b735d85fdf
SHA162a93b979c2634af2b39520df73249747bbed84c
SHA256850072b510695bd8649daad557e371b869054361e888d1aa4ffa51cf8e8c7c87
SHA512e727a8e987da902339c6ceef93e163fedaa8a0a03c5e0784ac919653f0428f8723ebab7d232cef80bd1337956254c4333fba500ee85fdfdc2a80884822e48363
-
memory/1904-0-0x0000000074A32000-0x0000000074A33000-memory.dmpFilesize
4KB
-
memory/1904-1-0x0000000074A30000-0x0000000074FE1000-memory.dmpFilesize
5.7MB
-
memory/1904-2-0x0000000074A30000-0x0000000074FE1000-memory.dmpFilesize
5.7MB
-
memory/1904-12-0x0000000074A30000-0x0000000074FE1000-memory.dmpFilesize
5.7MB
-
memory/3428-13-0x0000000074A30000-0x0000000074FE1000-memory.dmpFilesize
5.7MB
-
memory/3428-15-0x0000000074A30000-0x0000000074FE1000-memory.dmpFilesize
5.7MB